76 research outputs found

    Sensor Event Processing on Grid

    Get PDF
    Wireless sensor networks are increasingly being deployed in many important applications. For sharing huge amount of sensor data efficiently with diverse users, an information dissemination mechanism is very necessary and important component. In this paper, we have proposed an efficient architecture integrated with sensor network and Grid technology. To disseminate the sensed data to users geographically distributed, an experimental method using Data Grid on pub/sub (publish/subscription) is designed for a u-Healthcare application and its performance is evaluated for various predicate cases

    Network as a Service and its Key Challenges in Cloud Computing

    Get PDF
    With the passage of time, cloud computing is gaining importance due its usability, flexibility, efficiency, and reachability.  Virtualization is the key component in cloud computing. Through virtualization, not only software and hardware resources are efficiently used, but also a lot of money is saved. Virtual networking is also an emerging utilization, achieved through virtualization of resources. Keeping in view the importance of this area of research, this paper discusses about virtual networking and the key challenges involved in it and in virtual switch

    Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs

    Get PDF
    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly

    Lightweight Intrusion Detection for Wireless Sensor Networks

    Get PDF

    IPTV Service Framework Based on Secure Authentication and Lightweight Content Encryption for Screen-Migration in Cloud Computing

    Get PDF
    These days, the advancing of smart devices (e.g. smart phones, tablets, PC, etc.) capabilities and the increase of internet bandwidth enables IPTV service provider to extend their services to smart mobile devices. User can just receive their IPTV service using any smart devices by accessing the internet via wireless network from anywhere anytime in the world which is convenience for users. However, wireless network communication has well a known critical security threats and vulnerabilities to user smart devices and IPTV service such as user identity theft, reply attack, MIM attack, and so forth. A secure authentication for user devices and multimedia protection mechanism is necessary to protect both user devices and IPTV services. As result, we proposed framework of IPTV service based on secure authentication mechanism and lightweight content encryption method for screen-migration in Cloud computing. We used cryptographic nonce combined with user ID and password to authenticate user device in any mobile terminal they passes by. In addition we used Lightweight content encryption to protect and reduce the content decode overload at mobile terminals. Our proposed authentication mechanism reduces the computational processing by 30% comparing to other authentication mechanism and our lightweight content encryption reduces encryption delay to 0.259 second

    Content-aware QoE Optimization in MEC-assisted Mobile Video Streaming

    Get PDF
    The traditional client-based HTTP adaptation strategies do not explicitly coordinate between the clients, servers, and cellular networks. A lack of coordination leads to suboptimal user experience. In addition to optimizing Quality of Experience (QoE), other challenges in adapting HTTP adaptive streaming (HAS) to the cellular environment are overcoming unfair allocation of the video rate and inefficient utilization of the bandwidth under the high-dynamics cellular links. Furthermore, the majority of the adaptive strategies ignore important video content characteristics and HAS client information, such as segment duration, buffer size, and video duration, in the video quality selection process. In this paper, we present a content-aware hybrid multi-access edge computing (MEC)-assisted quality adaptation algorithm by taking advantage of the capabilities of edge cloud computing. The proposed algorithm exploits video content characteristics, HAS client settings, and application-layer information to jointly adapt the bitrates of multiple clients. We design separate strategies to optimize the performance of short and long duration videos. We then demonstrate the efficiency of our algorithm against client-based solutions as well as MEC-assisted algorithms. The proposed algorithm guarantees high QoE, equitably selects video rates for clients, and efficiently utilizes the bandwidth for both short and long duration videos. The results from our extensive experiments reveal that the proposed long video adaptation algorithm outperforms state-of-the-art algorithms, with improvements in average video rate, QoE, fairness, and bandwidth utilization of 0.4%-12.3%, 8%-65%, 3.3%-5.7%, and 60%-130%, respectively. Furthermore, when high bandwidth is available to competing clients, the proposed short video adaptation algorithm improves QoE by 11.1% compared to the long video adaptation algorithm

    An asymmetric key-based security architecture for wireless sensor networks

    Get PDF
    In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they can be utilized for such networks in some manner. The major challenge of employing a PKC-based scheme in a wireless sensor network is posed by the resource limitations of the tiny sensors. Considering this sensor feature, in this paper we propose an efficient PKC-based security architecture with relatively lower resource requirements than those of previously proposed PKC schemes for WSN. In addition, our scheme aims to provide robust security in the network. Our security architecture comprises two basic components; a key handshaking scheme based on simple, linear operations and the derivation of a decryption key by a receiver node. Our architecture enables node-to-base-station and node-to-node secure communications. Analysis and simulation results show that our proposed architecture ensures a good level of security for network communications, and can be effectively implemented with the limited computational, memory, and energy budgets of current-generation sensor nodes

    Mobile Services Meet Distributed Cloud: Benefits, Applications, and Challenges

    Get PDF
    As the explosive growth of smart devices and enormous new applications, the variety of corresponding cloud services has been growing quickly. The conventional centralized cloud was faced with an overhead on backhaul links and high latency. Accordingly, a decentralized cloud paradigm including edge computing, mobile edge computing, cloudlet, and so on, was introduced to distribute cloud services to the edge network which located in proximity to mobile devices few years ago. However, this paradigm was not paid attention at that time since cloud technology and mobile network communication were immature to motivate mobile services. Recently, with the overwhelming growth of mobile communication technology and cloud technology, distributed cloud is emerging as a paradigm well equipped with technologies to support a broad range of mobile services. The 5G mobile communication technology provides high-speed data and low latency. Cloud services can be automatically deployed in the edge networks quickly and easily. Distributed cloud can prove itself to bring many benefits for mobile service such as reducing network latency, as well as computational and network overhead at the central cloud. Besides, we present some applications to emphasize the necessity of distributed cloud for mobile service and discuss further technical challenges in distributed cloud

    Device agent assisted blockchain leveraged framework for Internet of Things

    Get PDF
    Blockchain (BC) is a burgeoning technology that has emerged as a promising solution to peer-to-peer communication security and privacy challenges. As a revolutionary technology, blockchain has drawn the attention of academics and researchers. Cryptocurrencies have already effectively utilized BC technology. Many researchers have sought to implement this technique in different sectors, including the Internet of Things. To store and manage IoT data, we present in this paper a lightweight BC-based architecture with a modified raft algorithm-based consensus protocol. We designed a Device Agent that executes a novel registration procedure to connect IoT devices to the blockchain. We implemented the framework on Docker using the Go programming language. We have simulated the framework on a Linux environment hosted in the cloud. We have conducted a detailed performance analysis using a variety of measures. The results demonstrate that our suggested solution is suitable for facilitating the management of IoT data with increased security and privacy. In terms of throughput and block generation time, the results indicate that our solution might be 40% to 45% faster than the existing blockchain. © 2013 IEEE
    corecore